Observed Activity: Network Communication from Indonesian IP Address

Discover fresh insights and innovative ideas by exploring our blog,  where we share creative perspectives

Observed Activity: Network Communication from Indonesian IP Address

Executive Summary

  • SGI observed network communication originating from IP address 103.179.27.93, associated with AS149333 (PT Primadona Media Digitalindo) in Indonesia.
  • The observed activity involved a file identified by SHA256 hash 01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b.
  • VirusTotal analysis of the file indicates a low maliciousness score, but a high number of undetected statuses, suggesting potential obscurity.
  • The likely objective is reconnaissance or initial access, with the possibility of delivering malicious content or exploiting vulnerabilities.
  • Business risk is currently assessed as low, but requires monitoring due to the unknown nature of the file.

Organizations should implement network monitoring and endpoint detection rules to identify and block similar traffic patterns.

Observed Activity (SGI Sensors)

ObservedAt SensorName SourceIP SourceASN SourceGeo Protocol/Port PayloadPresence Hash
2025-10-26T08:37:46.241Z 103.179.27.XXX AS149333 ID tcp/ Yes 01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b

On October 26, 2025, at 08:37:46 UTC, an SGI sensor detected network communication from IP address 103.179.27.93, originating from Samarinda, East Kalimantan, Indonesia. The source ASN is AS149333, registered to PT Primadona Media Digitalindo. A payload was present, and the SHA256 hash of the payload is 01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b. Further investigation is needed to understand the complete nature of the network traffic.

Malware/Technique Overview

The observed file is identified as standalone-framework.js. While classified as low severity, JavaScript files can be used for a variety of malicious purposes, including:

  • Webpage Redirection: Redirecting users to phishing sites or malicious download locations.
  • Information Stealing: Collecting user data like cookies, browsing history, or form data.
  • Remote Code Execution: If vulnerabilities exist, JavaScript can be used to execute arbitrary code on the user’s machine.

Given the lack of specific TTPs, a broad mapping is provided:

  • T1204 – User Execution
  • T1059 – Command and Scripting Interpreter
  • T1189 – Drive-by Compromise

VirusTotal Snapshot

VirusTotal analysis shows:

  • Malicious detections: 0
  • Undetected: 58
  • Harmless: 0

The lack of malicious detections despite a high number of undetected results suggests the file may be obfuscated, newly created, or designed to evade common detection methods. It is associated with several aliases including “plugin.js”, and “config.js”.

Indicators of Compromise (IoCs)

Type Value Confidence FirstSeen Notes
IP 103.179.27.XXX Medium 2025-10-26T08:37:46.241Z AS149333 PT Primadona Media Digitalindo
Hash 01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b High 2025-10-26T08:37:46.241Z SHA256 from VirusTotal

It is recommended to monitor these IoCs for at least 30 days.

Detection & Hunting

Splunk SPL

index=* sourcetype=proxy OR sourcetype=web_access "103.179.27.93"
| stats count by dest_ip, url, user

This query searches for connections to or from the identified IP address. Review the results for unusual patterns or destinations. False positives may include legitimate business services hosted in that region.

Elastic/Kibana KQL

(source.ip : "103.179.27.93") or (destination.ip : "103.179.27.93")

This query searches for network traffic involving the identified IP address.

Containment, Eradication & Recovery

  1. Isolate Affected Systems: Disconnect any systems that communicated with the identified IP address from the network to prevent further potential compromise.
  2. Block the IP Address: Add the IP address (103.179.27.93) to your firewall blocklist to prevent further communication.
  3. Scan Systems: Perform a full system scan on potentially affected endpoints using updated antivirus and anti-malware solutions.
  4. Credential Reset: If compromise is suspected, reset passwords for user accounts that may have been exposed.

Remember to inform the IT and leadership teams about the incident. Preserve any relevant logs and artifacts for forensic analysis.

Hardening & Preventive Controls

  1. Implement Multi-Factor Authentication (MFA): (NIST CSF: PR.AC-1, CIS Control 6) Enforce MFA for all users, especially those with privileged access.
  2. Tune Endpoint Detection and Response (EDR) Solutions: (NIST CSF: DE.CM-1, CIS Control 10) Configure EDR solutions to detect and block malicious JavaScript execution.
  3. Network Segmentation: (NIST CSF: PR.AC-5, CIS Control 14) Segment the network to limit the impact of potential breaches.
  4. Principle of Least Privilege: (NIST CSF: PR.AC-3, CIS Control 5) Grant users only the minimum necessary privileges.
  5. Patch Management: (NIST CSF: PR.MA-1, CIS Control 7) Maintain a rigorous patch management schedule to address known vulnerabilities.

Business Impact & Risk Outlook

The business impact is currently considered low, but potential risks include:

  • Operational Disruption: If the JavaScript file delivers malicious code, it could disrupt business operations.
  • Reputational Damage: A successful attack could damage the organization’s reputation.

Over the next 3-6 months, we anticipate an increase in obfuscated JavaScript-based attacks targeting vulnerabilities in web applications and browsers.

Appendix

Assumptions & Data Gaps:

  • The full payload of the network communication was not captured.
  • The specific application or service targeted by the communication is unknown.
  • Complete network logs and endpoint telemetry are not available for a broader investigation.

References:

Stay ahead of emerging threats with Sentry Global Intelligence & Consulting Group. Our expert team provides comprehensive threat intelligence and actionable security solutions. Request an Incident Readiness Review today to assess your organization’s security posture. Benefit from 24/7 Monitoring with Sentry365™, ensuring continuous protection against evolving threats. For strategic security guidance, consider our vCISO Advisory services.

Leave A Comment

Create your account